General
-
Target
HappyMod-3-1-5.apk
-
Size
17.4MB
-
Sample
250201-b8brfasrfj
-
MD5
0ef4f4f011c3e16e18b18584d2f40393
-
SHA1
d4a1292884579509009f85fbe480e819f4e103a9
-
SHA256
a7e864470fc10ae55241364ce076007552af9673177e15caf4c20062bfc7339a
-
SHA512
a85a12907e4a3b5bae1d80771817798c123688c2b4fc1945efdb65ff9d1ad4168186add6c55ae4ade9a969c9e0f67cab2672031aafbaca76386e74357211636b
-
SSDEEP
393216:zp0TcbMT8whcEb7NqnKdzbspDNx4GhY6qqoe2w+FCropPvAUqfE:zacQTvcEUnKRwMGm6qqf0CkpQUqfE
Static task
static1
Behavioral task
behavioral1
Sample
HappyMod-3-1-5.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
HappyMod-3-1-5.apk
-
Size
17.4MB
-
MD5
0ef4f4f011c3e16e18b18584d2f40393
-
SHA1
d4a1292884579509009f85fbe480e819f4e103a9
-
SHA256
a7e864470fc10ae55241364ce076007552af9673177e15caf4c20062bfc7339a
-
SHA512
a85a12907e4a3b5bae1d80771817798c123688c2b4fc1945efdb65ff9d1ad4168186add6c55ae4ade9a969c9e0f67cab2672031aafbaca76386e74357211636b
-
SSDEEP
393216:zp0TcbMT8whcEb7NqnKdzbspDNx4GhY6qqoe2w+FCropPvAUqfE:zacQTvcEUnKRwMGm6qqf0CkpQUqfE
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2